Cyber Security Unit - II Notes
1. Importance of Mobile and Wireless Devices
● Ubiquity and Accessibility: Mobile devices are omnipresent, enabling seamless
access to information and services.
● Communication and Connectivity: Facilitates voice calls, messaging, and multimedia
interactions, enhanced by 4G and 5G technologies.
● Productivity and Remote Work: Supports professionals in remote work through email
access, document management, and collaboration tools.
● E-commerce and Mobile Banking: Revolutionizes online shopping and financial
transactions via mobile apps.
● Education and Learning: Enables access to educational resources, online courses,
and collaborative learning.
● Navigation and Location-Based Services: GPS integration enhances mapping,
navigation, and location-based applications.
● Social Connectivity: Strengthens global communication through social media and
instant messaging apps.
● Healthcare and Wellness: Empowers health tracking and telemedicine through mobile
applications.
2. Proliferation of Mobile and Wireless Devices
● Widespread Adoption: Increasing dependency on mobile devices, propelled by
advances in wireless communication (4G, 5G).
● Global Connectivity: Instant access to data and real-time communication, reducing
geographical limitations.
● Impact on Business and Education: Boosts business efficiency and integrates
seamlessly into modern educational frameworks.
3. Mobile Computing, Wireless Computing, and Hand-Held Devices
● Mobile Computing: Portable devices enabling data access and exchange while in
transit.
● Wireless Computing: Uses wireless technologies to facilitate device communication
without physical connections.
● Hand-Held Devices: Small, portable devices (e.g., smartphones, tablets) designed for
convenient usage.
4. Trends in Mobility
● Enhanced Usability: Improved networking speeds and expanded application
functionalities.
● Popular Devices: Leading examples include Apple iPhones and Android-powered
smartphones.
● Security Challenges: Increased cyber threats necessitate robust security measures.
5. Types of Mobility and Implications
● User Mobility: Uninterrupted network access while on the move, introducing security
concerns.
● Device Mobility: Seamless movement between networks requires efficient handoff
protocols.
● Session Mobility: Uninterrupted session transitions across networks and devices.
● Service Mobility: Cross-platform access to services, requiring cloud and interoperability
support.
6. Attacks on 3G Mobile Networks
● Malware, Viruses, and Worms: Malicious programs compromising device security.
● Denial-of-Service (DoS): Overloading network resources, rendering them unavailable.
● Overbilling Attack: Manipulation of network protocols to generate fraudulent charges.
● Spoofed PDP: Unauthorized access by masquerading as a legitimate device.
● Signaling-Level Attacks: Disrupts communication protocols, leading to service
interruptions or eavesdropping.
7. Credit Card Fraud in Mobile and Wireless Computing
● Rising Incidents: Increased mobile usage has led to a surge in fraud cases.
● Prevention Measures:
○ Do’s: Sign cards, maintain transaction records, change default PINs, verify
website authenticity.
○ Don'ts: Avoid storing card details, lending cards, or signing blank receipts.
8. Security Challenges Posed by Mobile Devices
● Data Outside Secure Environments: Portability increases exposure to risks.
● Remote Access Risks: Higher chances of unauthorized access and data breaches.
9. Technical Challenges in Mobile Security
● Registry Settings: Secure configuration management.
● Authentication Security: Protection of PINs, biometrics, and login credentials.
● Cryptography: Encryption techniques for secure data storage and transmission.
● LDAP Security: Secure directory services used in mobile applications.
● RAS Security: Protection of remote access services.
● Media Player Security: Prevention of vulnerabilities in multimedia applications.
● Networking API Security: Securing application interfaces communicating over
networks.
10. Authentication Services Security
● Definition: Ensuring only authorized users and devices gain access.
● Types of Attacks:
○ Push Attacks: Forced malware installations.
○ Pull Attacks: Malicious content downloaded from unreliable sources.
○ Crash Attacks: Exploiting vulnerabilities to cause application or device crashes.
11. Attacks on Mobile/Cell Phones
● Device Theft: Physical loss leading to unauthorized data access.
● Mobile Viruses: Malicious software impacting device performance.
● Mishing, Vishing, Smishing: Fraudulent phishing via SMS, calls, and messages.
● Bluetooth Hacking: Unauthorized exploitation of Bluetooth connections.
12. Security Implications for Organizations
● Device Management: Tracking and securing mobile devices, especially after employees
leave organizations.
● Unconventional Storage Risks: USB drives and external storage devices pose
potential threats.
● Lost or Stolen Devices: Increased risk of corporate data breaches.
13. Safeguarding Information Systems in Mobile Computing
● Database Encryption: Using robust encryption algorithms like AES and RSA for data
security.
● Mobile Device Security Strategy: Organizations must incorporate mobile security
measures and employee awareness programs.
14. Importance of Security Policies for Mobile Devices
● Data Protection: Policies ensuring safe handling of sensitive information.
● Network Security: Secure internet connections and VPN usage.
● Malware Defense: Best practices for secure browsing and app installations.
● Theft Protection: Remote wipe and encryption mechanisms to mitigate risks.
15. Operating Guidelines for Mobile Device Security
● Security Assessment: Determining the necessity of mobile devices within an
organization.
● Technology Implementation: Utilizing encryption, biometric authentication, and secure
passcodes.
● Standardization: Establishing security standards across all mobile devices.
● Inventory Control: Monitoring device usage and maintaining an up-to-date inventory.
● Training & Awareness: Educating users on mobile security best practices and potential
threats.